Project Number Date
test_Tails_ISO_5501-plaintext-locale-greeter 18 08 Jun 2025, 09:07

Feature Report

Steps Scenarios Features
Feature Passed Failed Skipped Pending Undefined Total Passed Failed Total Duration Status
The Tor enforcement is effective 3 9 31 0 0 43 0 9 9 10:27.552 Failed
Tags: @product
Feature The Tor enforcement is effective
As a Tails user I want all direct Internet connections I do by mistake or applications do by misconfiguration or buggy leaks to be blocked And as a Tails developer I want to ensure that the automated test suite detects firewall leaks reliably
Tags: @product
1:9.083
Scenario The firewall configuration is very restrictive
Before features/support/hooks.rb:266 0.000
Before features/support/hooks.rb:273 0.004
Steps
Given I have started Tails from DVD and logged in and the network is connected 1:9.083
TCA
TCA did not start (TorBootstrapFailure)
./features/step_definitions/tor.rb:375:in `rescue in block in <top (required)>'
./features/step_definitions/tor.rb:371:in `/^the Tor Connection Assistant (?:autostarts|is running)$/'
./features/step_definitions/common_steps.rb:652:in `/^I successfully configure Tor$/'
./features/step_definitions/common_steps.rb:607:in `/^Tor is ready$/'
./features/step_definitions/snapshots.rb:153:in `block in reach_checkpoint'
./features/step_definitions/snapshots.rb:150:in `each'
./features/step_definitions/snapshots.rb:150:in `reach_checkpoint'
./features/step_definitions/snapshots.rb:173:in `/^I\ have\ started\ Tails\ from\ DVD\ and\ logged\ in\ and\ the\ network\ is\ connected$/'
features/tor_enforcement.feature:9:in `Given I have started Tails from DVD and logged in and the network is connected'
Then the firewall's policy is to drop all IPv4 traffic 0.000
And the firewall is configured to only allow the clearnet and debian-tor users to connect directly to the Internet over IPv4 0.000
And the firewall's NAT rules only redirect traffic for the Unsafe Browser, Tor's TransPort, and DNSPort 0.000
And the firewall is configured to block all external IPv6 traffic 0.000
After features/support/hooks.rb:330 8.782

SCENARIO FAILED: 'The firewall configuration is very restrictive' (at time 03:38:46)

Chutney logs: https://jenkins.tails.boum.org/job/test_Tails_ISO_5501-plaintext-locale-greeter/18/artifact/build-artifacts/03:38:46_The_firewall_configuration_is_very_restrictive_chutney-data

Boot log: https://jenkins.tails.boum.org/job/test_Tails_ISO_5501-plaintext-locale-greeter/18/artifact/build-artifacts/03:38:46_The_firewall_configuration_is_very_restrictive.file_content_var_log_boot.log

Screenshot: https://jenkins.tails.boum.org/job/test_Tails_ISO_5501-plaintext-locale-greeter/18/artifact/build-artifacts/03:38:46_The_firewall_configuration_is_very_restrictive.png

Video: https://jenkins.tails.boum.org/job/test_Tails_ISO_5501-plaintext-locale-greeter/18/artifact/build-artifacts/03:38:46_The_firewall_configuration_is_very_restrictive.mkv

Systemd journal: https://jenkins.tails.boum.org/job/test_Tails_ISO_5501-plaintext-locale-greeter/18/artifact/build-artifacts/03:38:46_The_firewall_configuration_is_very_restrictive.journal

After features/support/hooks.rb:100 0.000
Tags: @product
1:9.705
Scenario Anti test: Detecting TCP leaks from the Unsafe Browser with the firewall leak detector
Before features/support/hooks.rb:266 0.000
Before features/support/hooks.rb:273 0.003
Steps
Given I have started Tails from DVD and logged in and the network is connected 1:9.705
TCA
TCA did not start (TorBootstrapFailure)
./features/step_definitions/tor.rb:375:in `rescue in block in <top (required)>'
./features/step_definitions/tor.rb:371:in `/^the Tor Connection Assistant (?:autostarts|is running)$/'
./features/step_definitions/common_steps.rb:652:in `/^I successfully configure Tor$/'
./features/step_definitions/common_steps.rb:607:in `/^Tor is ready$/'
./features/step_definitions/snapshots.rb:153:in `block in reach_checkpoint'
./features/step_definitions/snapshots.rb:150:in `each'
./features/step_definitions/snapshots.rb:150:in `reach_checkpoint'
./features/step_definitions/snapshots.rb:173:in `/^I\ have\ started\ Tails\ from\ DVD\ and\ logged\ in\ and\ the\ network\ is\ connected$/'
features/tor_enforcement.feature:16:in `Given I have started Tails from DVD and logged in and the network is connected'
And I capture all network traffic 0.000
When I successfully start the Unsafe Browser 0.000
And I open the Tails homepage in the Unsafe Browser 0.000
And the Tails homepage loads in the Unsafe Browser 0.000
Then the firewall leak detector has detected leaks 0.000
After features/support/hooks.rb:330 8.778

SCENARIO FAILED: 'Anti test: Detecting TCP leaks from the Unsafe Browser with the firewall leak detector' (at time 03:40:05)

Chutney logs: https://jenkins.tails.boum.org/job/test_Tails_ISO_5501-plaintext-locale-greeter/18/artifact/build-artifacts/03:40:05_Anti_test:_Detecting_TCP_leaks_from_the_Unsafe_Browser_with_the_firewall_leak_detector_chutney-data

Boot log: https://jenkins.tails.boum.org/job/test_Tails_ISO_5501-plaintext-locale-greeter/18/artifact/build-artifacts/03:40:05_Anti_test:_Detecting_TCP_leaks_from_the_Unsafe_Browser_with_the_firewall_leak_detector.file_content_var_log_boot.log

Screenshot: https://jenkins.tails.boum.org/job/test_Tails_ISO_5501-plaintext-locale-greeter/18/artifact/build-artifacts/03:40:05_Anti_test:_Detecting_TCP_leaks_from_the_Unsafe_Browser_with_the_firewall_leak_detector.png

Video: https://jenkins.tails.boum.org/job/test_Tails_ISO_5501-plaintext-locale-greeter/18/artifact/build-artifacts/03:40:05_Anti_test:_Detecting_TCP_leaks_from_the_Unsafe_Browser_with_the_firewall_leak_detector.mkv

Systemd journal: https://jenkins.tails.boum.org/job/test_Tails_ISO_5501-plaintext-locale-greeter/18/artifact/build-artifacts/03:40:05_Anti_test:_Detecting_TCP_leaks_from_the_Unsafe_Browser_with_the_firewall_leak_detector.journal

After features/support/hooks.rb:100 0.000
Tags: @product
1:10.540
Scenario Anti test: Detecting TCP leaks of DNS lookups with the firewall leak detector
Before features/support/hooks.rb:266 0.000
Before features/support/hooks.rb:273 0.004
Steps
Given I have started Tails from DVD and logged in and the network is connected 1:10.540
TCA
TCA did not start (TorBootstrapFailure)
./features/step_definitions/tor.rb:375:in `rescue in block in <top (required)>'
./features/step_definitions/tor.rb:371:in `/^the Tor Connection Assistant (?:autostarts|is running)$/'
./features/step_definitions/common_steps.rb:652:in `/^I successfully configure Tor$/'
./features/step_definitions/common_steps.rb:607:in `/^Tor is ready$/'
./features/step_definitions/snapshots.rb:153:in `block in reach_checkpoint'
./features/step_definitions/snapshots.rb:150:in `each'
./features/step_definitions/snapshots.rb:150:in `reach_checkpoint'
./features/step_definitions/snapshots.rb:173:in `/^I\ have\ started\ Tails\ from\ DVD\ and\ logged\ in\ and\ the\ network\ is\ connected$/'
features/tor_enforcement.feature:24:in `Given I have started Tails from DVD and logged in and the network is connected'
And I capture all network traffic 0.000
And I disable Tails' firewall 0.000
When I do a TCP DNS lookup of "torproject.org" 0.000
Then the firewall leak detector has detected leaks 0.000
After features/support/hooks.rb:330 9.219

SCENARIO FAILED: 'Anti test: Detecting TCP leaks of DNS lookups with the firewall leak detector' (at time 03:41:24)

Chutney logs: https://jenkins.tails.boum.org/job/test_Tails_ISO_5501-plaintext-locale-greeter/18/artifact/build-artifacts/03:41:24_Anti_test:_Detecting_TCP_leaks_of_DNS_lookups_with_the_firewall_leak_detector_chutney-data

Boot log: https://jenkins.tails.boum.org/job/test_Tails_ISO_5501-plaintext-locale-greeter/18/artifact/build-artifacts/03:41:24_Anti_test:_Detecting_TCP_leaks_of_DNS_lookups_with_the_firewall_leak_detector.file_content_var_log_boot.log

Screenshot: https://jenkins.tails.boum.org/job/test_Tails_ISO_5501-plaintext-locale-greeter/18/artifact/build-artifacts/03:41:24_Anti_test:_Detecting_TCP_leaks_of_DNS_lookups_with_the_firewall_leak_detector.png

Video: https://jenkins.tails.boum.org/job/test_Tails_ISO_5501-plaintext-locale-greeter/18/artifact/build-artifacts/03:41:24_Anti_test:_Detecting_TCP_leaks_of_DNS_lookups_with_the_firewall_leak_detector.mkv

Systemd journal: https://jenkins.tails.boum.org/job/test_Tails_ISO_5501-plaintext-locale-greeter/18/artifact/build-artifacts/03:41:24_Anti_test:_Detecting_TCP_leaks_of_DNS_lookups_with_the_firewall_leak_detector.journal

After features/support/hooks.rb:100 0.000
Tags: @product
1:9.828
Scenario Anti test: Detecting UDP leaks of DNS lookups with the firewall leak detector
Before features/support/hooks.rb:266 0.000
Before features/support/hooks.rb:273 0.010
Steps
Given I have started Tails from DVD and logged in and the network is connected 1:9.828
TCA
TCA did not start (TorBootstrapFailure)
./features/step_definitions/tor.rb:375:in `rescue in block in <top (required)>'
./features/step_definitions/tor.rb:371:in `/^the Tor Connection Assistant (?:autostarts|is running)$/'
./features/step_definitions/common_steps.rb:652:in `/^I successfully configure Tor$/'
./features/step_definitions/common_steps.rb:607:in `/^Tor is ready$/'
./features/step_definitions/snapshots.rb:153:in `block in reach_checkpoint'
./features/step_definitions/snapshots.rb:150:in `each'
./features/step_definitions/snapshots.rb:150:in `reach_checkpoint'
./features/step_definitions/snapshots.rb:173:in `/^I\ have\ started\ Tails\ from\ DVD\ and\ logged\ in\ and\ the\ network\ is\ connected$/'
features/tor_enforcement.feature:31:in `Given I have started Tails from DVD and logged in and the network is connected'
And I capture all network traffic 0.000
And I disable Tails' firewall 0.000
When I do a UDP DNS lookup of "torproject.org" 0.000
Then the firewall leak detector has detected leaks 0.000
After features/support/hooks.rb:330 8.755

SCENARIO FAILED: 'Anti test: Detecting UDP leaks of DNS lookups with the firewall leak detector' (at time 03:42:43)

Chutney logs: https://jenkins.tails.boum.org/job/test_Tails_ISO_5501-plaintext-locale-greeter/18/artifact/build-artifacts/03:42:43_Anti_test:_Detecting_UDP_leaks_of_DNS_lookups_with_the_firewall_leak_detector_chutney-data

Boot log: https://jenkins.tails.boum.org/job/test_Tails_ISO_5501-plaintext-locale-greeter/18/artifact/build-artifacts/03:42:43_Anti_test:_Detecting_UDP_leaks_of_DNS_lookups_with_the_firewall_leak_detector.file_content_var_log_boot.log

Screenshot: https://jenkins.tails.boum.org/job/test_Tails_ISO_5501-plaintext-locale-greeter/18/artifact/build-artifacts/03:42:43_Anti_test:_Detecting_UDP_leaks_of_DNS_lookups_with_the_firewall_leak_detector.png

Video: https://jenkins.tails.boum.org/job/test_Tails_ISO_5501-plaintext-locale-greeter/18/artifact/build-artifacts/03:42:43_Anti_test:_Detecting_UDP_leaks_of_DNS_lookups_with_the_firewall_leak_detector.mkv

Systemd journal: https://jenkins.tails.boum.org/job/test_Tails_ISO_5501-plaintext-locale-greeter/18/artifact/build-artifacts/03:42:43_Anti_test:_Detecting_UDP_leaks_of_DNS_lookups_with_the_firewall_leak_detector.journal

After features/support/hooks.rb:100 0.000
Tags: @product
1:10.307
Scenario Anti test: Detecting ICMP leaks of ping with the firewall leak detector
Before features/support/hooks.rb:266 0.000
Before features/support/hooks.rb:273 0.004
Steps
Given I have started Tails from DVD and logged in and the network is connected 1:10.307
TCA
TCA did not start (TorBootstrapFailure)
./features/step_definitions/tor.rb:375:in `rescue in block in <top (required)>'
./features/step_definitions/tor.rb:371:in `/^the Tor Connection Assistant (?:autostarts|is running)$/'
./features/step_definitions/common_steps.rb:652:in `/^I successfully configure Tor$/'
./features/step_definitions/common_steps.rb:607:in `/^Tor is ready$/'
./features/step_definitions/snapshots.rb:153:in `block in reach_checkpoint'
./features/step_definitions/snapshots.rb:150:in `each'
./features/step_definitions/snapshots.rb:150:in `reach_checkpoint'
./features/step_definitions/snapshots.rb:173:in `/^I\ have\ started\ Tails\ from\ DVD\ and\ logged\ in\ and\ the\ network\ is\ connected$/'
features/tor_enforcement.feature:38:in `Given I have started Tails from DVD and logged in and the network is connected'
And I capture all network traffic 0.000
And I disable Tails' firewall 0.000
When I send some ICMP pings 0.000
Then the firewall leak detector has detected leaks 0.000
After features/support/hooks.rb:330 8.691

SCENARIO FAILED: 'Anti test: Detecting ICMP leaks of ping with the firewall leak detector' (at time 03:44:02)

Chutney logs: https://jenkins.tails.boum.org/job/test_Tails_ISO_5501-plaintext-locale-greeter/18/artifact/build-artifacts/03:44:02_Anti_test:_Detecting_ICMP_leaks_of_ping_with_the_firewall_leak_detector_chutney-data

Boot log: https://jenkins.tails.boum.org/job/test_Tails_ISO_5501-plaintext-locale-greeter/18/artifact/build-artifacts/03:44:02_Anti_test:_Detecting_ICMP_leaks_of_ping_with_the_firewall_leak_detector.file_content_var_log_boot.log

Screenshot: https://jenkins.tails.boum.org/job/test_Tails_ISO_5501-plaintext-locale-greeter/18/artifact/build-artifacts/03:44:02_Anti_test:_Detecting_ICMP_leaks_of_ping_with_the_firewall_leak_detector.png

Video: https://jenkins.tails.boum.org/job/test_Tails_ISO_5501-plaintext-locale-greeter/18/artifact/build-artifacts/03:44:02_Anti_test:_Detecting_ICMP_leaks_of_ping_with_the_firewall_leak_detector.mkv

Systemd journal: https://jenkins.tails.boum.org/job/test_Tails_ISO_5501-plaintext-locale-greeter/18/artifact/build-artifacts/03:44:02_Anti_test:_Detecting_ICMP_leaks_of_ping_with_the_firewall_leak_detector.journal

After features/support/hooks.rb:100 0.000
1:9.321
Scenario The Tor enforcement is effective at blocking untorified TCP connection attempts
Before features/support/hooks.rb:266 0.000
Before features/support/hooks.rb:273 0.003
Before features/support/hooks.rb:513 0.004
Steps
Given I have started Tails from DVD and logged in and the network is connected 1:9.321
TCA
TCA did not start (TorBootstrapFailure)
./features/step_definitions/tor.rb:375:in `rescue in block in <top (required)>'
./features/step_definitions/tor.rb:371:in `/^the Tor Connection Assistant (?:autostarts|is running)$/'
./features/step_definitions/common_steps.rb:652:in `/^I successfully configure Tor$/'
./features/step_definitions/common_steps.rb:607:in `/^Tor is ready$/'
./features/step_definitions/snapshots.rb:153:in `block in reach_checkpoint'
./features/step_definitions/snapshots.rb:150:in `each'
./features/step_definitions/snapshots.rb:150:in `reach_checkpoint'
./features/step_definitions/snapshots.rb:173:in `/^I\ have\ started\ Tails\ from\ DVD\ and\ logged\ in\ and\ the\ network\ is\ connected$/'
features/tor_enforcement.feature:46:in `Given I have started Tails from DVD and logged in and the network is connected'
When I open an untorified TCP connection to 1.2.3.4 on port 42 0.000
Then the untorified connection fails 0.000
And the untorified connection is logged as dropped by the firewall 0.000
After features/support/hooks.rb:521 0.049
After features/support/hooks.rb:330 8.486

SCENARIO FAILED: 'The Tor enforcement is effective at blocking untorified TCP connection attempts' (at time 03:45:20)

Chutney logs: https://jenkins.tails.boum.org/job/test_Tails_ISO_5501-plaintext-locale-greeter/18/artifact/build-artifacts/03:45:20_The_Tor_enforcement_is_effective_at_blocking_untorified_TCP_connection_attempts_chutney-data

Boot log: https://jenkins.tails.boum.org/job/test_Tails_ISO_5501-plaintext-locale-greeter/18/artifact/build-artifacts/03:45:20_The_Tor_enforcement_is_effective_at_blocking_untorified_TCP_connection_attempts.file_content_var_log_boot.log

Screenshot: https://jenkins.tails.boum.org/job/test_Tails_ISO_5501-plaintext-locale-greeter/18/artifact/build-artifacts/03:45:20_The_Tor_enforcement_is_effective_at_blocking_untorified_TCP_connection_attempts.png

Video: https://jenkins.tails.boum.org/job/test_Tails_ISO_5501-plaintext-locale-greeter/18/artifact/build-artifacts/03:45:20_The_Tor_enforcement_is_effective_at_blocking_untorified_TCP_connection_attempts.mkv

Systemd journal: https://jenkins.tails.boum.org/job/test_Tails_ISO_5501-plaintext-locale-greeter/18/artifact/build-artifacts/03:45:20_The_Tor_enforcement_is_effective_at_blocking_untorified_TCP_connection_attempts.journal

After features/support/hooks.rb:100 0.000
1:9.465
Scenario The Tor enforcement is effective at blocking untorified UDP connection attempts
Before features/support/hooks.rb:266 0.000
Before features/support/hooks.rb:273 0.004
Before features/support/hooks.rb:513 0.004
Steps
Given I have started Tails from DVD and logged in and the network is connected 1:9.465
TCA
TCA did not start (TorBootstrapFailure)
./features/step_definitions/tor.rb:375:in `rescue in block in <top (required)>'
./features/step_definitions/tor.rb:371:in `/^the Tor Connection Assistant (?:autostarts|is running)$/'
./features/step_definitions/common_steps.rb:652:in `/^I successfully configure Tor$/'
./features/step_definitions/common_steps.rb:607:in `/^Tor is ready$/'
./features/step_definitions/snapshots.rb:153:in `block in reach_checkpoint'
./features/step_definitions/snapshots.rb:150:in `each'
./features/step_definitions/snapshots.rb:150:in `reach_checkpoint'
./features/step_definitions/snapshots.rb:173:in `/^I\ have\ started\ Tails\ from\ DVD\ and\ logged\ in\ and\ the\ network\ is\ connected$/'
features/tor_enforcement.feature:53:in `Given I have started Tails from DVD and logged in and the network is connected'
When I open an untorified UDP connection to 1.2.3.4 on port 42 0.000
Then the untorified connection fails 0.000
And the untorified connection is logged as dropped by the firewall 0.000
After features/support/hooks.rb:521 0.030
After features/support/hooks.rb:330 9.154

SCENARIO FAILED: 'The Tor enforcement is effective at blocking untorified UDP connection attempts' (at time 03:46:38)

Chutney logs: https://jenkins.tails.boum.org/job/test_Tails_ISO_5501-plaintext-locale-greeter/18/artifact/build-artifacts/03:46:38_The_Tor_enforcement_is_effective_at_blocking_untorified_UDP_connection_attempts_chutney-data

Boot log: https://jenkins.tails.boum.org/job/test_Tails_ISO_5501-plaintext-locale-greeter/18/artifact/build-artifacts/03:46:38_The_Tor_enforcement_is_effective_at_blocking_untorified_UDP_connection_attempts.file_content_var_log_boot.log

Screenshot: https://jenkins.tails.boum.org/job/test_Tails_ISO_5501-plaintext-locale-greeter/18/artifact/build-artifacts/03:46:38_The_Tor_enforcement_is_effective_at_blocking_untorified_UDP_connection_attempts.png

Video: https://jenkins.tails.boum.org/job/test_Tails_ISO_5501-plaintext-locale-greeter/18/artifact/build-artifacts/03:46:38_The_Tor_enforcement_is_effective_at_blocking_untorified_UDP_connection_attempts.mkv

Systemd journal: https://jenkins.tails.boum.org/job/test_Tails_ISO_5501-plaintext-locale-greeter/18/artifact/build-artifacts/03:46:38_The_Tor_enforcement_is_effective_at_blocking_untorified_UDP_connection_attempts.journal

After features/support/hooks.rb:100 0.000
1:9.953
Scenario The Tor enforcement is effective at blocking untorified ICMP connection attempts
Before features/support/hooks.rb:266 0.000
Before features/support/hooks.rb:273 0.006
Before features/support/hooks.rb:513 0.006
Steps
Given I have started Tails from DVD and logged in and the network is connected 1:9.953
TCA
TCA did not start (TorBootstrapFailure)
./features/step_definitions/tor.rb:375:in `rescue in block in <top (required)>'
./features/step_definitions/tor.rb:371:in `/^the Tor Connection Assistant (?:autostarts|is running)$/'
./features/step_definitions/common_steps.rb:652:in `/^I successfully configure Tor$/'
./features/step_definitions/common_steps.rb:607:in `/^Tor is ready$/'
./features/step_definitions/snapshots.rb:153:in `block in reach_checkpoint'
./features/step_definitions/snapshots.rb:150:in `each'
./features/step_definitions/snapshots.rb:150:in `reach_checkpoint'
./features/step_definitions/snapshots.rb:173:in `/^I\ have\ started\ Tails\ from\ DVD\ and\ logged\ in\ and\ the\ network\ is\ connected$/'
features/tor_enforcement.feature:60:in `Given I have started Tails from DVD and logged in and the network is connected'
When I open an untorified ICMP connection to 1.2.3.4 0.000
Then the untorified connection fails 0.000
And the untorified connection is logged as dropped by the firewall 0.000
After features/support/hooks.rb:521 0.034
After features/support/hooks.rb:330 8.636

SCENARIO FAILED: 'The Tor enforcement is effective at blocking untorified ICMP connection attempts' (at time 03:47:58)

Chutney logs: https://jenkins.tails.boum.org/job/test_Tails_ISO_5501-plaintext-locale-greeter/18/artifact/build-artifacts/03:47:58_The_Tor_enforcement_is_effective_at_blocking_untorified_ICMP_connection_attempts_chutney-data

Boot log: https://jenkins.tails.boum.org/job/test_Tails_ISO_5501-plaintext-locale-greeter/18/artifact/build-artifacts/03:47:58_The_Tor_enforcement_is_effective_at_blocking_untorified_ICMP_connection_attempts.file_content_var_log_boot.log

Screenshot: https://jenkins.tails.boum.org/job/test_Tails_ISO_5501-plaintext-locale-greeter/18/artifact/build-artifacts/03:47:58_The_Tor_enforcement_is_effective_at_blocking_untorified_ICMP_connection_attempts.png

Video: https://jenkins.tails.boum.org/job/test_Tails_ISO_5501-plaintext-locale-greeter/18/artifact/build-artifacts/03:47:58_The_Tor_enforcement_is_effective_at_blocking_untorified_ICMP_connection_attempts.mkv

Systemd journal: https://jenkins.tails.boum.org/job/test_Tails_ISO_5501-plaintext-locale-greeter/18/artifact/build-artifacts/03:47:58_The_Tor_enforcement_is_effective_at_blocking_untorified_ICMP_connection_attempts.journal

After features/support/hooks.rb:100 0.000
Tags: @product
1:9.346
Scenario The system DNS is always set up to use Tor's DNSPort
Before features/support/hooks.rb:266 0.000
Before features/support/hooks.rb:273 0.003
Steps
Given I have started Tails from DVD without network and logged in 8.342
And the system DNS is using the local DNS resolver 0.023
And the network is plugged 0.091
And I successfully configure Tor 1:0.889
TCA
TCA did not start (TorBootstrapFailure)
./features/step_definitions/tor.rb:375:in `rescue in block in <top (required)>'
./features/step_definitions/tor.rb:371:in `/^the Tor Connection Assistant (?:autostarts|is running)$/'
./features/step_definitions/common_steps.rb:652:in `/^I successfully configure Tor$/'
features/tor_enforcement.feature:69:in `And I successfully configure Tor'
Then the system DNS is still using the local DNS resolver 0.000
After features/support/hooks.rb:330 8.818

SCENARIO FAILED: 'The system DNS is always set up to use Tor's DNSPort' (at time 03:49:16)

Chutney logs: https://jenkins.tails.boum.org/job/test_Tails_ISO_5501-plaintext-locale-greeter/18/artifact/build-artifacts/03:49:16_The_system_DNS_is_always_set_up_to_use_Tor_s_DNSPort_chutney-data

Boot log: https://jenkins.tails.boum.org/job/test_Tails_ISO_5501-plaintext-locale-greeter/18/artifact/build-artifacts/03:49:16_The_system_DNS_is_always_set_up_to_use_Tor_s_DNSPort.file_content_var_log_boot.log

Screenshot: https://jenkins.tails.boum.org/job/test_Tails_ISO_5501-plaintext-locale-greeter/18/artifact/build-artifacts/03:49:16_The_system_DNS_is_always_set_up_to_use_Tor_s_DNSPort.png

Video: https://jenkins.tails.boum.org/job/test_Tails_ISO_5501-plaintext-locale-greeter/18/artifact/build-artifacts/03:49:16_The_system_DNS_is_always_set_up_to_use_Tor_s_DNSPort.mkv

Systemd journal: https://jenkins.tails.boum.org/job/test_Tails_ISO_5501-plaintext-locale-greeter/18/artifact/build-artifacts/03:49:16_The_system_DNS_is_always_set_up_to_use_Tor_s_DNSPort.journal

After features/support/hooks.rb:100 0.000